Java

Location intelligence News

  • March 01, 2016 01 Mar'16

    Incident response procedures speed discovery-response time

    Many companies become aware of a security event but take hours or days to perform triage and finally remediate it. Incident response procedures can vary based on the organization, and the type of security incident, which could involve DDoS attacks, malware breach and containment or information disclosure. Emerging technologies in the areas of detection and response claim to remediate violations and monitor alerts, so overworked staff doesn't have to spend hours on a single event. Should security incident handling ever be automated or outsourced? We look at incident response procedures and technology advances to help enterprises with detection and response.

    Enterprise-sponsored bug bounty programs continue to grow in popularity. Some companies have adopted invitation-only bug bounty programs, leading to a higher percentage of quality submissions than reported in public crowdsourcing programs. We explore the best ways to manage the risks involved with paying unknown researchers.

    We continue our Readers' Top Picks series with a look at enterprise mobility management. EMM is not a monolithic product so much as an approach to managing and securing endpoints with mobile device management, mobile application management and more. Even application distribution, which is still new to many enterprises, garnered an impressive share as an important consideration among readers. We share the shortlist compiled from those who indicated plans to invest in EMM tools in the next 12 months.

  • February 26, 2016 26 Feb'16

    B2B integration: Now on your smartphone?

    "All of the hooks are there -- let's put it that way -- for mobile to play a greater role." Ann Grackin, ChainLink Research

  • February 22, 2016 22 Feb'16

    Adobe Marketing Cloud sports new mobile app features

    With the addition of new mobile app features, Adobe Marketing Cloud strives to make enterprise mobile apps more compelling and user-friendly.

  • January 29, 2016 29 Jan'16

    Report highlights growing role for location-mapping software

    A new report from Dresner Advisory Services says businesses see increased value in location intelligence software, but products need to improve.

View All News

Location intelligence Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Location intelligence Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Location intelligence

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Location intelligence Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

  • What's the best way to prevent accelerometer tracking?

    Attackers can use accelerometer tracking on mobile devices as an eavesdropping tool. Here are some ways to reduce the threat to your device. Continue Reading

  • LBS technology expands customer service, business operations

    Many modern consumers and workers are always tuned-in to the digital world. They have laptops, tablets and smartphones that chirp and beep away with incoming messages. Those devices are also sending out information -- tweets and texts, yes -- but also location data. Companies looking to score an edge are turning to location-based services (LBS) technology to better engage and understand consumers and workers.

    In the cover story of the October 2015 issue of Business Information, executive editor Lauren Horwitz reveals some of the creative ways companies are employing LBS technology to reach out to customers at the right time and in the right place. But for that timing to be just right, Horwitz writes later in a column, businesses and IT professionals need to dig deep into customer data gathered from sources such as account information, social media and online chats. If they do that, targeted encounters with customers will have a better chance for success.

    Organizations are also benefiting greatly from LBS technology in tracking the work routines of their own employees. In another feature, reporter Ed Burns looks at two very divergent industries, healthcare and trucking. First, he demonstrates how one major hospital used location tracking to improve the floor movements of its nurses. Burns continues with the story of a large package-delivery company that integrated routes and weather data to more accurately estimate delivery time.

    On a more personal note, this issue covers job satisfaction of IT professionals. Also, find out how one business intelligence director convinced a governor and his cabinet to overhaul the state's inefficient database management system. Continue Reading

  • Cyber Reconnaissance, Surveillance and Defense

    In this excerpt of Cyber Reconnaissance, Surveillance and Defense, author Robert Shimonski describes commonly used mobile technology and how phone tracking works. Continue Reading

View All Problem Solve